Continuous-variable quantum key distribution protocols with eight-state discrete modulation
We propose a continuous variable quantum key distribution protocol based on discrete modulation of eight-state coherent states. We present a rigorous security proof against the collective attacks by taking into consideration the realistic lossy and noisy quantum channel,the imperfect detector effici...
| Main Authors: | Wahiddin, Mohamed Ridza, Becir, A, El-Orany, Faisal A. A. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
World Scientific Publishing Company
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28165/ http://irep.iium.edu.my/28165/1/S0219749912500049.pdf |
Similar Items
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012)
by: Becir, A, et al.
Published: (2012)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
A linear atomic quantum coupler
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection
by: Becir, A, et al.
Published: (2010)
by: Becir, A, et al.
Published: (2010)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
Deterministic six states protocol for quantum communication
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Quantum properties of the three-mode squeezed operator: triply concurrent parametric amplifiers
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Quantum state engineering with ququarts: application for deterministic QKD protocol
by: Shurupov, Alexander P., et al.
Published: (2009)
by: Shurupov, Alexander P., et al.
Published: (2009)
Anticlone Gaussian attack for continuous variable EPR correlations
by: Messikh Azeddine, Azeddine, et al.
Published: (2007)
by: Messikh Azeddine, Azeddine, et al.
Published: (2007)
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Continuous-variable versus hybrid schemes for quantum teleportation of Gaussian states
by: Kogias, Ioannis, et al.
Published: (2014)
by: Kogias, Ioannis, et al.
Published: (2014)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Single-atom entropy squeezing for two two-level atoms interacting with a single-mode radiation field
by: El-Orany, Faisal A.A, et al.
Published: (2008)
by: El-Orany, Faisal A.A, et al.
Published: (2008)
Quantum optics for beginners
by: Ficek, Zbigniew, et al.
Published: (2014)
by: Ficek, Zbigniew, et al.
Published: (2014)
Eight key issues for the decision support systems discipline
by: Arnott, David, et al.
Published: (2008)
by: Arnott, David, et al.
Published: (2008)
Optimal continuous variable quantum teleportation with limited resources
by: Liuzzo-Scorpo, Pietro, et al.
Published: (2017)
by: Liuzzo-Scorpo, Pietro, et al.
Published: (2017)
A novel error correction scheme in quantum key distribution (QKD) protocol
by: Lee, Siao Ping, et al.
Published: (2015)
by: Lee, Siao Ping, et al.
Published: (2015)
An efficient modeling and simulation of quantum key distribution protocols using OptiSystemâ„¢
by: Buhari, Abudhahir, et al.
Published: (2012)
by: Buhari, Abudhahir, et al.
Published: (2012)
Implementation of decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
A protocol for secret key infusion from satellite transmissions
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
Apparatus for flipping the polarization state of an optical pulse between a transmitter and a receiver in quantum key distribution and method thereof
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Practical quantum key distribution
by: Ali, Sellami
Published: (2012)
by: Ali, Sellami
Published: (2012)
Similar Items
-
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012) -
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012) -
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009) -
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)